Quantcast
Channel: SANS Internet Storm Center, InfoCON: green
Browsing all 8244 articles
Browse latest View live
↧

Finding in Cisco's Annual Security Report, (Sat, Jan 25th)

The report highlight the fact that now "[...] the cybercrime network has become so mature, far-reaching, well-funded, and highly effective as a business operation that very little in the cybersecurity...

View Article


Looking for Packets for IP address 71.6.165.200, (Sun, Jan 26th)

The DShield database this morning show a tremendous uptick in activity coming out of IP address 71.6.165.200 over the past few weeks, so I am reaching out to everyone to see if anybody has packets...

View Article


ISC StormCast for Monday, January 27th 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Image may be NSFW.
Clik here to view.

Log Parsing with Mandiant Highlighter (1), (Mon, Jan 27th)

Reading log isn’t the most enjoyable thing in Network/Security Analysis, sometimes it’s impossible to get something useful from log without using a log parser .In this diary I am going to talk about...

View Article

ISC StormCast for Tuesday, January 28th 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


Sendmail v8.14.8 released -...

-Kevin -- ISC Handler on Duty (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

How to send mass e-mail the right way, (Fri, Jan 24th)

We all don't like spam, but sometimes, there are good reasons to send large amounts of automatically created e-mails. Order confirmations, newsletters or similar services. Sadly, I often see how it is...

View Article

ISC StormCast for Wednesday, January 29th 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


How to Debug DKIM, (Wed, Jan 29th)

DKIM is one way to make it easier for other servers to figure out if an e-mail sent on behalf of your domain is spoofed. Your mail server will add a digital signature to each email authenticating the...

View Article


Oracle Reports Vulnerability, (Thu, Jan 30th)

I mentioned this vulnerability earlier this week in a podcast, but believe it deserves a bit more attention, in particular as exploits are now public, and a metasploit module appears in the works....

View Article

ISC StormCast for Thursday, January 30th 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

IPv6 and isc.sans.edu (Update), (Thu, Jan 30th)

About 4 years ago, I published a quick diary summarizing our experience with IPv6 at the time [1]. Back then, the IPv6 traffic to our site was miniscule. 1.3% of clients connecting to our server used...

View Article

New gTLDs appearing in the root zone, (Thu, Jan 30th)

Over the last month or so, new gTLDs (generic top level domains) have been added to the root zone by ICANN. This is the beginning of a process of adding a couple hundred new gTLDs which ICANN colleted...

View Article


Attack on Yahoo mail accounts, (Fri, Jan 31st)

Yahoo announced they discovered attempts to access Yahoo mail accounts [1]. Not a huge amount of information has currently been released about what happened, but the usernames and passwords have come...

View Article

ISC StormCast for Friday, January 31st 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article


CVE-2013-6230 & CVE 2014-0591 fixed in BIND 9.9.5, BIND 9.8.7 & BIND...

Chris Mohan --- Internet Storm Center Handler on Duty (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

Looking for packets from three particular subnets, (Fri, Jan 31st)

A reader wrote in reporting seeing a large amount odd activity from three subnets across a large number of disparate networks he managed. Addresses from these subnets have been generating between...

View Article


ISC StormCast for Monday, February 3rd 2014...

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

View Article

When an Attack isn't an Attack, (Mon, Feb 3rd)

I think I have seen it referred to as the "X-Files Effect". You just installed a new firewall or IDS, it is still all new and shiny and the logs are still fresh and interesting. Looking at your logs,...

View Article

Triple Handshake Cookie Cutter, (Tue, Mar 4th)

Researches have released a paper describing several vulnerabilities in TLS (Transport Layer Security). Some of the attacks have been known for a while, but the paper combines and explains them nicely,...

View Article
Browsing all 8244 articles
Browse latest View live